ALAS-2014-277


Amazon Linux AMI Security Advisory: ALAS-2014-277
Advisory Release Date: 2014-09-16 22:19 Pacific
Severity: Important

Issue Overview:

An integer overflow, which led to a heap-based buffer overflow, was found in the way X.Org server handled trapezoids. A malicious, authorized client could use this flaw to crash the X.Org server or, potentially, execute arbitrary code with root privileges. (CVE-2013-6424 )


Affected Packages:

xorg-x11-server


Issue Correction:
Run yum update xorg-x11-server to update your system.

New Packages:
noarch:
    xorg-x11-server-source-1.13.0-23.1.36.amzn1.noarch

src:
    xorg-x11-server-1.13.0-23.1.36.amzn1.src

x86_64:
    xorg-x11-server-devel-1.13.0-23.1.36.amzn1.x86_64
    xorg-x11-server-Xephyr-1.13.0-23.1.36.amzn1.x86_64
    xorg-x11-server-debuginfo-1.13.0-23.1.36.amzn1.x86_64
    xorg-x11-server-common-1.13.0-23.1.36.amzn1.x86_64
    xorg-x11-server-Xnest-1.13.0-23.1.36.amzn1.x86_64
    xorg-x11-server-Xorg-1.13.0-23.1.36.amzn1.x86_64
    xorg-x11-server-Xvfb-1.13.0-23.1.36.amzn1.x86_64
    xorg-x11-server-Xdmx-1.13.0-23.1.36.amzn1.x86_64